Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Limerick" +contributor:("Dojen, Reiner"). Showing records 1 – 3 of 3 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Limerick

1. Zhang, Fan. On the security and energy consumption estimation of wireless sensor network protocols.

Degree: 2012, University of Limerick

peer-reviewed

Along with the recent rapid development of Wireless Sensor Network (WSN) systems, the range of attacks against WSN routing protocols have grown. As a result, there is an increased need for secure WSN routing protocols. WSN routing protocols should be secured once they are involved in sensitive data transmission. However, secure routing protocols require extra time and energy for security computations. Further, due to the limited power supply of WSN nodes, it is useful to theoretically evaluate the energy consumption of the protocol prior to their deployment. This thesis concerns the energy efficiency of WSN routing protocols and the cost of security in terms of additional energy dissipation. Two new secure routing protocols are proposed and their security is analyzed. Further, the energy consumption of the new protocols is evaluated using estimation methods and empirical measurements. Comparison of these results reveals that current estimation models have significant inaccuracies. A new energy consumption estimation model is proposed that computes the energy consumption of microcontrollers during: security operations, memory read-write operations and radio transceiver actions. Applying the proposed estimation model against the previously analyzed protocols demonstrates that it more accurately forecasts the actual energy consumption than traditional models.

Advisors/Committee Members: Dojen, Reiner, Coffey, Tom.

Subjects/Keywords: wireless sensor network; WSN; energy efficiency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, F. (2012). On the security and energy consumption estimation of wireless sensor network protocols. (Thesis). University of Limerick. Retrieved from http://hdl.handle.net/10344/2857

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Fan. “On the security and energy consumption estimation of wireless sensor network protocols.” 2012. Thesis, University of Limerick. Accessed February 21, 2019. http://hdl.handle.net/10344/2857.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Fan. “On the security and energy consumption estimation of wireless sensor network protocols.” 2012. Web. 21 Feb 2019.

Vancouver:

Zhang F. On the security and energy consumption estimation of wireless sensor network protocols. [Internet] [Thesis]. University of Limerick; 2012. [cited 2019 Feb 21]. Available from: http://hdl.handle.net/10344/2857.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang F. On the security and energy consumption estimation of wireless sensor network protocols. [Thesis]. University of Limerick; 2012. Available from: http://hdl.handle.net/10344/2857

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Limerick

2. Muntean, Carla Lucia Mirona. Logic based analysis of security protocols in a unified verification framework.

Degree: 2012, University of Limerick

peer-reviewed

Security protocols are one of the imperative steps in creating and ensuring the secure communication and information processing. Also known as cryptographic protocols or encryption protocols, they are used for secure application-level data transport achieved by using a security function and applying cryptographic methods. A wide variety of different forms of security go beyond the traditional goals of secure authentication, integrity and data confidentiality. Modern applications require more subtle properties like blind signatures used for digital cash, non-repudiation, secure digital time-stamping, etc. However, these protocols are vulnerable to different kinds of attacks and their design in achieving data safety and confidentiality has proven to be challenging and error prone. Informal and intuitive techniques have been proposed to verify such protocols. Several methods such as modal logics and state space exploration were developed to ensure formal verification and validation of security protocols. This thesis presents the integration of a logic based verification technique into an existing verification framework. The existing framework unifies the verification of protocols through both state based techniques and modal logics. The integration is done through a translator that takes the input file specified in the language of the verification framework and translates it into the language of the logic-based verification technique. The validity of the proposed translation/integration is demonstrated in an empirical study in which a set of protocols are specified and their verification results are compared using the old logic based verification engine and the new verification framework. Comparison of both verification results establishes their equivalence. This proves validity of the translation process between the two verification engines.

Advisors/Committee Members: Coffey, Tom, Dojen, Reiner.

Subjects/Keywords: secure communication; information processing; crytographic protocols

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Muntean, C. L. M. (2012). Logic based analysis of security protocols in a unified verification framework. (Thesis). University of Limerick. Retrieved from http://hdl.handle.net/10344/2859

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Muntean, Carla Lucia Mirona. “Logic based analysis of security protocols in a unified verification framework.” 2012. Thesis, University of Limerick. Accessed February 21, 2019. http://hdl.handle.net/10344/2859.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Muntean, Carla Lucia Mirona. “Logic based analysis of security protocols in a unified verification framework.” 2012. Web. 21 Feb 2019.

Vancouver:

Muntean CLM. Logic based analysis of security protocols in a unified verification framework. [Internet] [Thesis]. University of Limerick; 2012. [cited 2019 Feb 21]. Available from: http://hdl.handle.net/10344/2859.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Muntean CLM. Logic based analysis of security protocols in a unified verification framework. [Thesis]. University of Limerick; 2012. Available from: http://hdl.handle.net/10344/2859

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Limerick

3. Lasc, Ioana. Addressing synchrony issues of dynamic shared secrets in security protocols.

Degree: 2011, University of Limerick

peer-reviewed

This research addresses synchronisation issues in security protocols for wireless communications. A new class of attacks, termed Suppress-and-Desynchronise (SD) attacks, is introduced. This attack uses the vulnerabilities of the wireless links to exploit a weakness in the security protocols that use dynamic shared secrets for authentication purposes. To avoid problems with the long-term storage of shared secrets, these protocols use dynamic shared secrets that are updated to new values in each session by an underlying online update mechanism. A successful SD attack disables the affected parties from authenticating each other in future protocol runs, causing a permanent Denial of Service (DoS) condition. A formal system to model update mechanisms for shared secrets is introduced that expresses actions of principals, their storing strategies for shared secrets and the principals’ roles in the different types of update mechanism. Based on this formal system attack detection rules are developed that are able to detect synchrony weaknesses that can be exploited by Suppress-and-Desynchronise attacks. Further, within the same formal system, a solution to the synchronisation problem is identified. A new approach to the security systems design is proposed for the wireless communications environment to avoid facilitating occurrence of the presented DoS condition. A guide to the formalisation process of security protocols prior to application of detection rules is presented. Finally, five security protocols are formalized, analysed and corrected using the proposed formal system.

Advisors/Committee Members: Coffey, Tom, Dojen, Reiner, IRC, SFI.

Subjects/Keywords: wireless communications; security protocols; long-term storage; shared secrets

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lasc, I. (2011). Addressing synchrony issues of dynamic shared secrets in security protocols. (Thesis). University of Limerick. Retrieved from http://hdl.handle.net/10344/4175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lasc, Ioana. “Addressing synchrony issues of dynamic shared secrets in security protocols.” 2011. Thesis, University of Limerick. Accessed February 21, 2019. http://hdl.handle.net/10344/4175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lasc, Ioana. “Addressing synchrony issues of dynamic shared secrets in security protocols.” 2011. Web. 21 Feb 2019.

Vancouver:

Lasc I. Addressing synchrony issues of dynamic shared secrets in security protocols. [Internet] [Thesis]. University of Limerick; 2011. [cited 2019 Feb 21]. Available from: http://hdl.handle.net/10344/4175.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lasc I. Addressing synchrony issues of dynamic shared secrets in security protocols. [Thesis]. University of Limerick; 2011. Available from: http://hdl.handle.net/10344/4175

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.